Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 11: Managing a Secure Network

Similar presentations


Presentation on theme: "Chapter 11: Managing a Secure Network"— Presentation transcript:

1 Chapter 11: Managing a Secure Network
CCNA Security v2.0

2 Chapter Outline 11.0 Introduction 11.1 Network Security Testing
11.2 Developing a Comprehensive Security Policy 11.3 Summary Chapter Outline

3 Section 11.1: Network Security Testing
Upon completion of this section, you should be able to: Describe the techniques used in network security testing. Describe the tools used in network security testing.

4 Topic 11.1.1: Network Security Testing Techniques

5 Operations Security Operations Security

6 Testing and Evaluating Network Security

7 Types of Network Tests Operational Status of the Network:
Penetration testing Network scanning Vulnerability scanning Password cracking Log review Integrity checks Virus detection Types of Network Tests

8 Applying Network Test Results

9 Topic 11.1.2: Network Security Testing Tools

10 Network Testing Tools Nmap/Zenmap SuperScan SIEM GFI LANguard Tripwire
Nessus L0phtCrack Metasploit Network Testing Tools

11 Nmap and Zenmap Sample Nmap Screenshot Sample Zenmap Screenshot

12 SuperScan SuperScan

13 SIEM Essential functions: Forensic Analysis Correlation Aggregation
Retention SIEM Activity – Identify Network Security Testing Tools

14 Section 11.2: Developing a Comprehensive Security Policy
Upon completion of this section, you should be able to: Explain the purpose of a comprehensive security policy. Describe the structure of a comprehensive security policy. Describe the standards, guidelines, and procedures of a security policy. Explain the roles and responsibilities entailed by a security policy. Explain security awareness and how to achieve through education and training. Explain how to respond to a security breach.

15 Topic 11.2.1: Security Policy Overview

16 Secure Network Life Cycle
Determine what the assets of an organization are by asking: What does the organization have that others want? What processes, data, or information systems are critical to the organization? What would stop the organization from doing business or fulfilling its mission? Secure Network Life Cycle

17 Security Policy Security Policy

18 Security Policy Audience
Audience Determines Security Policy Content Security Policy Audience

19 Topic 11.2.2: Structure of a Security Policy

20 Security Policy Hierarchy

21 Governing Policy A governing policy includes:
Statement of the issue that the policy addresses How the policy applies in the environment Roles and responsibilities of those affected by the policy Actions, activities, and processes that are allowed (and not allowed) Consequences of noncompliance Governing Policy

22 Technical Policies Technical components: General policies
Telephony policy and communication policy Remote access policy Network policy Application policy Technical Policies

23 End User Polices Customize End-User Policies for Groups
Activity – Identify Security Policy Components

24 Topic 11.2.3: Standards, Guidelines, and Procedures

25 Security Policy Documents

26 Standards Documents Standards Documents

27 Guideline Documents NIST Information Technology Portal

28 Guideline Documents (Cont.)
NSA Website Guideline Documents (Cont.)

29 Guideline Documents (Cont.)
Common Criteria Website Guideline Documents (Cont.)

30 Procedure Documents Procedure Documents

31 Topic 11.2.4: Roles and Responsibilities

32 Organizational Reporting Structure

33 Common Executive Titles
Chief Executive Officer (CEO) Chief Technology Officer (CTO) Chief Information Officer (CIO) Chief Security Officer (CSO) Chief Information Security Officer (CISO) Common Executive Titles

34 Topic 11.2.5: Security Awareness and Training

35 Security Awareness Program
Primary components: Awareness campaigns Training and education Security Awareness Program Awareness Campaigns Security Training Course Education Program

36 Topic 11.2.6: Responding to a Security Breach

37 Motive, Opportunity, and Means

38 Collecting Data Collecting Data

39 Section 11.3: Summary Chapter Objectives:
Explain the various techniques and tools used for network security testing. Explain how to develop a comprehensive security policy. Packet Tracer – Skills Integration Challenge Lab – CCNA Security Comprehensive Lab Chapter 11: Managing a Secure Network

40

41 Instructor Resources Remember, there are helpful tutorials and user guides available via your NetSpace home page. ( These resources cover a variety of topics including navigation, assessments, and assignments. A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2


Download ppt "Chapter 11: Managing a Secure Network"

Similar presentations


Ads by Google